FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.3 and below, due to a bypass of double clickjacking protection (confirmation dialog), it is possible to trick the admin into clicking the Promote button in another user's management page after the admin double clicks on a button inside an attacker-controlled website. A successful attack can allow the attacker to promote themselves to "admin" and log into other users' accounts; the attacker has to know the specific instance URL they're targeting. This issue is fixed in version 1.27.0.
References
| Link | Resource |
|---|---|
| https://github.com/FreshRSS/FreshRSS/pull/7771 | Patch |
| https://github.com/FreshRSS/FreshRSS/releases/tag/1.27.0 | Release Notes |
| https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j66v-hvqx-5vh3 | Exploit Vendor Advisory |
| https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j66v-hvqx-5vh3 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-09-30 04:43
Updated : 2025-10-03 15:52
NVD link : CVE-2025-59950
Mitre link : CVE-2025-59950
CVE.ORG link : CVE-2025-59950
JSON object : View
Products Affected
freshrss
- freshrss
CWE
CWE-1021
Improper Restriction of Rendered UI Layers or Frames
